Stealth attacks on ad-hoc wireless networks

Markus Jakobsson, Susanne Wetzel, Bülent Yener

Research output: Contribution to journalConference articlepeer-review

35 Scopus citations

Abstract

We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are "stealth attacks" in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control, and suggest that it can be used to augment existing routing protocols in order to immunize these against stealth attacks.

Original languageEnglish
Pages (from-to)2103-2111
Number of pages9
JournalIEEE Vehicular Technology Conference
Volume58
Issue number3
DOIs
StatePublished - 2003
Event2003 IEEE 58th Vehicular Technology Conference, VTC2003-Fall - Orlando, FL, United States
Duration: 6 Oct 20039 Oct 2003

Fingerprint

Dive into the research topics of 'Stealth attacks on ad-hoc wireless networks'. Together they form a unique fingerprint.

Cite this